{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T00:44:38.906","vulnerabilities":[{"cve":{"id":"CVE-2026-20069","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:22.717","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the VPN web services component of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device.\r\n\r\nThis vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious HTTP requests to a device that is running Cisco Secure Firewall ASA Software or Cisco Secure FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting (XSS) attacks. The attacker is not able to directly impact the affected device."},{"lang":"es","value":"Una vulnerabilidad en el componente de servicios web VPN de Cisco Secure Firewall Adaptive Security Appliance (ASA) Software y Cisco Secure Firewall Threat Defense (FTD) Software podría permitir a un atacante remoto no autenticado realizar ataques basados en el navegador contra los usuarios de un dispositivo afectado.\n\nEsta vulnerabilidad se debe a una validación incorrecta de las solicitudes HTTP. Un atacante podría explotar esta vulnerabilidad persuadiendo a un usuario para que visite un sitio web diseñado para pasar solicitudes HTTP maliciosas a un dispositivo que ejecuta Cisco Secure Firewall ASA Software o Cisco Secure FTD Software y tiene habilitados los puntos finales de servicios web que admiten funciones VPN. Un exploit exitoso podría permitir al atacante reflejar entradas maliciosas desde el dispositivo afectado al navegador en uso y realizar ataques basados en el navegador, incluyendo ataques de cross-site scripting (XSS). El atacante no puede impactar directamente el dispositivo afectado."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-444"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-desync-n5AVzEQw","source":"psirt@cisco.com"}]}}]}